id
stringlengths 13
15
| title
stringlengths 29
176
| description
stringlengths 8
32.1k
| cpes
listlengths 0
20
| cvss_v4_0
null | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
null |
---|---|---|---|---|---|---|---|
RHSA-2024:4871
|
Red Hat Security Advisory: Red Hat Service Interconnect security update
|
python: Path traversal on tempfile.TemporaryDirectory python: The zipfile module is vulnerable to zip-bombs leading to denial of service skupper: potential authentication bypass to skupper console via forged cookies
|
[
"cpe:/a:redhat:service_interconnect:1::el9"
] | null | 5.3 | null | null |
RHSA-2022:0664
|
Red Hat Security Advisory: samba security update
|
samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
|
[
"cpe:/o:redhat:rhel_aus:7.7::server",
"cpe:/o:redhat:rhel_e4s:7.7::server",
"cpe:/o:redhat:rhel_tus:7.7::server"
] | null | 9.9 | null | null |
RHSA-2024:3418
|
Red Hat Security Advisory: rust security update
|
rust-cargo: cargo does not respect the umask when extracting dependencies
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 6.7 | null | null |
RHSA-2024:8172
|
Red Hat Security Advisory: resource-agents security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 8.8 | null | null |
RHSA-2012:1135
|
Red Hat Security Advisory: libreoffice security update
|
libreoffice: Multiple heap-based buffer overflows in the XML manifest encryption handling code
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2023:7786
|
Red Hat Security Advisory: postgresql:10 security update
|
postgresql: Buffer overrun from integer overflow in array modification
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1543
|
Red Hat Security Advisory: dnsmasq security update
|
bind9: KeyTrap - Extreme CPU consumption in DNSSEC validator bind9: Preparing an NSEC3 closest encloser proof can exhaust CPU resources
|
[
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 7.5 | null | null |
RHSA-2021:3497
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:8792
|
Red Hat Security Advisory: krb5 security update
|
freeradius: forgery attack
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 9 | null | null |
RHSA-2021:2372
|
Red Hat Security Advisory: postgresql:12 security update
|
postgresql: Partition constraint violation errors leak values of denied columns postgresql: Buffer overrun from integer overflow in array subscripting calculations postgresql: Memory disclosure in INSERT ... ON CONFLICT ... DO UPDATE postgresql: Memory disclosure in partitioned-table UPDATE ... RETURNING
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 6.5 | null | null |
RHSA-2023:6266
|
Red Hat Security Advisory: squid security update
|
squid: Request/Response smuggling in HTTP/1.1 and ICAP squid: Denial of Service in HTTP Digest Authentication squid: denial of Service in FTP
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 8.6 | null | null |
RHSA-2020:4351
|
Red Hat Security Advisory: chromium-browser security update
|
freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png chromium-browser: Inappropriate implementation in Blink chromium-browser: Use after free in media chromium-browser: Use after free in PDFium chromium-browser: Use after free in printing
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
RHSA-2022:1489
|
Red Hat Security Advisory: java-1.8.0-openjdk security update
|
OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 5.3 | null | null |
RHSA-2014:0204
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.2.1 security update
|
EAP6: Plain text password logging during security audit
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el5",
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | null | null |
RHSA-2015:1123
|
Red Hat Security Advisory: cups security update
|
cups: cupsRasterReadPixels buffer overflow cups: incorrect string reference counting (VU#810572) cups: cross-site scripting flaw in CUPS web UI (VU#810572)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2020:2616
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage Mozilla: Use-after-free in SharedWorkerService Mozilla: JavaScript Type confusion with NativeTypes Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2013:0149
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: buffer overflow flaw that can lead to arbitrary code execution (APSB13-01)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2023:0483
|
Red Hat Security Advisory: Red Hat Fuse 7.11.1.P1 security update
|
hazelcast: Hazelcast connection caching CXF: directory listing / code exfiltration CXF: SSRF Vulnerability
|
[
"cpe:/a:redhat:jboss_fuse:7"
] | null | 9.8 | null | null |
RHSA-2016:2671
|
Red Hat Security Advisory: qemu-kvm-rhev security, bug fix, and enhancement update
|
Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: OOB access in address_space_rw leads to segmentation fault Qemu: net: out of bounds read in net_checksum_calculate()
|
[
"cpe:/a:redhat:openstack:9::el7"
] | null | null | 4.7 | null |
RHSA-2019:1860
|
Red Hat Security Advisory: rh-redis32-redis security update
|
redis: Heap corruption in lua_cmsgpack.c redis: Integer overflow in lua_struct.c:b_unpack() redis: Code execution in redis-cli via crafted command line arguments redis: Heap buffer overflow in HyperLogLog triggered by malicious client
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 7.2 | null |
RHSA-2022:5326
|
Red Hat Security Advisory: compat-openssl10 security update
|
openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2024:0468
|
Red Hat Security Advisory: grub2 security update
|
grub2: bypass the GRUB password protection feature
|
[
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 6.8 | null | null |
RHSA-2025:1340
|
Red Hat Security Advisory: thunderbird security update
|
thunderbird: Address of e-mail sender can be spoofed by malicious email firefox: thunderbird: Use-after-free in XSLT firefox: thunderbird: Use-after-free in Custom Highlight firefox: thunderbird: A bug in WebAssembly code generation could result in a crash firefox: thunderbird: Use-after-free during concurrent delazification firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows firefox: thunderbird: Certificate length was not properly checked thunderbird: Unsanitized address book fields firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
|
[
"cpe:/a:redhat:rhel_eus:8.8::appstream"
] | null | 8.8 | null | null |
RHSA-2024:10950
|
Red Hat Security Advisory: php:8.1 security update
|
php: host/secure cookie bypass due to partial CVE-2022-31629 fix php: password_verify can erroneously return true, opening ATO risk php: Filter bypass in filter_var (FILTER_VALIDATE_URL) php: Erroneous parsing of multipart form data php: cgi.force_redirect configuration is bypassable due to the environment variable collision php: PHP-FPM Log Manipulation Vulnerability
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 3.3 | null | null |
RHSA-2020:4999
|
Red Hat Security Advisory: unixODBC security update
|
unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c
|
[
"cpe:/o:redhat:rhel_eus:7.6::computenode",
"cpe:/o:redhat:rhel_eus:7.6::server"
] | null | null | 6.8 | null |
RHSA-2018:2428
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.2.4 security update
|
cxf: Improper size validation in message attachment header for JAX-WS and JAX-RS services apache-cxf: TLS hostname verification does not work correctly with com.sun.net.ssl.* guava: Unbounded memory allocation in AtomicDoubleArray and CompoundOrdering classes allow remote attackers to cause a denial of service wildfly-core: Path traversal can allow the extraction of .war archives to write arbitrary files (Zip Slip) keycloak: infinite loop in session replacement leading to denial of service bouncycastle: flaw in the low-level interface to RSA key pair generator
|
[
"cpe:/a:redhat:jboss_single_sign_on:7.2"
] | null | null | 4.8 | null |
RHSA-2023:3223
|
Red Hat Security Advisory: Red Hat AMQ Streams 2.4.0 release and security update
|
jackson-databind: denial of service via a large depth of nested objects okhttp: information disclosure via improperly used cryptographic function netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode netty: world readable temporary file containing sensitive data scala: deserialization gadget chain jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays Streams: component version with information disclosure flaw json-smart: Uncontrolled Resource Consumption vulnerability in json-smart (Resource Exhaustion) kafka: RCE/DoS via SASL JAAS JndiLoginModule configuration in Kafka Connect
|
[
"cpe:/a:redhat:amq_streams:2"
] | null | 8.8 | null | null |
RHSA-2020:1600
|
Red Hat Security Advisory: evolution security and bug fix update
|
evolution: specially crafted email leading to OpenPGP signatures being spoofed for arbitrary messages
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | null | 5.4 | null |
RHSA-2022:0587
|
Red Hat Security Advisory: Service Telemetry Framework 1.3 (sg-core-container) security update
|
golang: net/http: limit growth of header canonicalization cache
|
[
"cpe:/a:redhat:service_telemetry_framework:1.3::el8"
] | null | 7.5 | null | null |
RHSA-2012:1547
|
Red Hat Security Advisory: RHN Proxy Server 5 on Red Hat Enterprise Linux 4 - End Of Life
|
This is the End Of Life notification for RHN Proxy Server 5 versions
released to run on Red Hat Enterprise Linux 4.
|
[
"cpe:/a:redhat:network_proxy:5.0::el4",
"cpe:/a:redhat:network_proxy:5.1::el4",
"cpe:/a:redhat:network_proxy:5.2::el4",
"cpe:/a:redhat:network_proxy:5.3::el4"
] | null | null | null | null |
RHSA-2020:2617
|
Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.7.1-1 - RHEL7 Container
|
Tower: rsyslog configuration has world readable permissions
|
[
"cpe:/a:redhat:ansible_tower:3.7::el7"
] | null | 6.5 | null | null |
RHSA-2015:0085
|
Red Hat Security Advisory: java-1.6.0-openjdk security update
|
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack ICU: font parsing OOB read (OpenJDK 2D, 8055489) OpenJDK: MulticastSocket NULL pointer dereference (Libraries, 8056264) ICU: font parsing OOB read (OpenJDK 2D, 8056276) OpenJDK: incorrect tracking of ChangeCipherSpec during SSL/TLS handshake (JSSE, 8057555) OpenJDK: class verifier insufficient invokespecial calls verification (Hotspot, 8058982) OpenJDK: insecure hsperfdata temporary file handling (Hotspot, 8050807) OpenJDK: phantom references handling issue in garbage collector (Hotspot, 8047125) OpenJDK: directory information leak via file chooser (Swing, 8055304) OpenJDK: incorrect context class loader use in RMI transport (RMI, 8055309) OpenJDK: DER decoder infinite loop (Security, 8059485) OpenJDK: insufficient code privileges checks (JAX-WS, 8054367)
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
RHSA-2007:0488
|
Red Hat Security Advisory: kernel security update
|
NFS lockd deadlock oops in compat_sys_mount() when data pointer is NULL lost fput in a 32-bit ioctl on 64-bit x86 systems core-dumping unreadable binaries via PT_INTERP Bluetooth setsockopt() information leaks fib_semantics.c out of bounds access vulnerability PPPoE socket PPPIOCGCHAN denial of service nf}_conntrack_sctp: remotely triggerable NULL ptr dereference Null pointer to an inode in a dentry can cause an oops in sysfs_readdir
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2004:236
|
Red Hat Security Advisory: krb5 security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
RHSA-2023:3588
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Click-jacking certificate exceptions through rendering lag Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 9.8 | null | null |
RHSA-2021:0833
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.404 security and bug fix update
|
golang-github-gorilla-websocket: integer overflow leads to denial of service
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null |
RHSA-2018:3729
|
Red Hat Security Advisory: rh-ruby23-ruby security, bug fix, and enhancement update
|
ruby: HTTP response splitting in WEBrick ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir ruby: DoS by large request in WEBrick ruby: Buffer under-read in String#unpack ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket ruby: Unintentional directory traversal by poisoned NULL byte in Dir ruby: OpenSSL::X509:: Name equality check does not work correctly ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives rubygems: Path traversal when writing to a symlinked basedir outside of the root rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service rubygems: Improper verification of signatures in tarball allows to install mis-signed gem rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL rubygems: XSS vulnerability in homepage attribute when displayed via gem server rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations
|
[
"cpe:/a:redhat:rhel_software_collections:3::el6",
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | null | 5.5 | null |
RHSA-2024:10869
|
Red Hat Security Advisory: redis:7 security update
|
redis: Redis SORT_RO may bypass ACL configuration redis: possible bypass of Unix socket permissions on startup redis: Denial-of-service due to malformed ACL selectors in Redis redis: Denial-of-service due to unbounded pattern matching in Redis redis: Lua library commands may lead to stack overflow and RCE in Redis
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7 | null | null |
RHSA-2023:1966
|
Red Hat Security Advisory: pki-core:10.6 security update
|
pki-core: access to external entities when parsing XML can lead to XXE
|
[
"cpe:/a:redhat:rhel_eus:8.4::appstream"
] | null | 7.5 | null | null |
RHSA-2018:1825
|
Red Hat Security Advisory: chromium-browser security update
|
chromium-browser: Incorrect handling of CSP header
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null |
RHSA-2024:0605
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Out of bounds write in ANGLE Mozilla: Failure to update user input timestamp Mozilla: Crash when listing printers on Linux Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set Mozilla: Phishing site popup could show local origin in address bar Mozilla: Potential permissions request bypass via clickjacking Mozilla: Privilege escalation through devtools Mozilla: HSTS policy on subdomain could bypass policy of upper domain Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null |
RHSA-2024:1474
|
Red Hat Security Advisory: logging for Red Hat OpenShift security update
|
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON follow-redirects: Possible credential leak
|
[
"cpe:/a:redhat:logging:5.8::el9"
] | null | 6.5 | null | null |
RHSA-2020:3343
|
Red Hat Security Advisory: thunderbird security update
|
chromium-browser: Use after free in ANGLE chromium-browser: Inappropriate implementation in WebRTC Mozilla: Potential leak of redirect targets when loading scripts in a worker Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11
|
[
"cpe:/a:redhat:rhel_e4s:8.0::appstream"
] | null | 8.8 | 8.8 | null |
RHSA-2022:4993
|
Red Hat Security Advisory: xz security update
|
gzip: arbitrary-file-write vulnerability
|
[
"cpe:/a:redhat:rhel_eus:8.4::crb",
"cpe:/o:redhat:rhel_eus:8.4::baseos"
] | null | 8.8 | null | null |
RHSA-2021:0290
|
Red Hat Security Advisory: firefox security update
|
Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been Mozilla: Cross-origin information leakage via redirected PDF requests Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 6.1 | null |
RHSA-2020:4306
|
Red Hat Security Advisory: java-11-openjdk security and bug fix update
|
OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136)
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 5.3 | null | null |
RHSA-2013:1402
|
Red Hat Security Advisory: Adobe Reader - notification of end of updates
|
Updated acroread packages that disable the Adobe Reader web browser plug-in
are now available for Red Hat Enterprise Linux 5 and 6 Supplementary.
|
[
"cpe:/a:redhat:rhel_extras:5::client",
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2024:3758
|
Red Hat Security Advisory: idm:DL1 security update
|
freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream"
] | null | 8.1 | null | null |
RHBA-2018:0337
|
Red Hat Bug Fix Advisory: Red Hat Satellite 6.3 Base Libraries
|
v8: multiple vulnerabilities fixed in Google Chrome version 33.0.1750.146 rubygem-rack: Potential Denial of Service Vulnerability in Rack normalize_params() qpid-proton: reactor sends messages in clear if ssl is requested but not available
|
[
"cpe:/a:redhat:satellite:6.3::el7",
"cpe:/a:redhat:satellite_capsule:6.3::el7"
] | null | null | null | null |
RHSA-2023:0479
|
Red Hat Security Advisory: redhat-ds:12 security update
|
389-ds-base: SIGSEGV in sync_repl
|
[
"cpe:/a:redhat:directory_server:12::el9"
] | null | 6.5 | null | null |
RHSA-2013:0823
|
Red Hat Security Advisory: java-1.6.0-ibm security update
|
SSL/TLS: CBC padding timing attack (lucky-13) OpenJDK: sun.awt.datatransfer.ClassLoaderObjectInputStream class may incorrectly invoke the system class loader (CanSecWest 2013, AWT, 8009305) JDK: unspecified sanbox bypass (CanSecWest 2013, 2D) OpenJDK: remote code loading enabled by default (RMI, 8001040) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) OpenJDK: LogStream.setDefaultStream() missing security restrictions (RMI, 8001329) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Install) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004994) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004986) ICU: Layout Engine font layout and glyph table errors (JDK 2D, 8004987) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) OpenJDK: Network InetAddress serialization information disclosure (Networking, 8000724) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) ICU: Layout Engine font processing errors (JDK 2D, 8001031) OpenJDK: image processing vulnerability (2D, 8007617) OpenJDK: MethodUtil trampoline class incorrect restrictions (Libraries, 8009857) OpenJDK: MBeanInstantiator insufficient class access checks (JMX, 8006435) OpenJDK: JPEGImageWriter state corruption (ImageIO, 8007918) OpenJDK: JPEGImageReader state corruption (ImageIO, 8007667) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (2D) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment) JDK: unspecified vulnerability fixed in 7u21 and 6u45 (Deployment)
|
[
"cpe:/a:redhat:rhel_extras:5::server",
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2022:6707
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out of bounds read when decoding H264 Mozilla: Content-Security-Policy base-uri bypass Mozilla: Incoherent instruction cache when building WASM on ARM64 Mozilla: Bypassing Secure Context restriction for cookies with __Host and __Secure prefix Mozilla: Bypassing FeaturePolicy restrictions on transient pages Mozilla: Data-race when parsing non-UTF-8 URLs in threads Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3
|
[
"cpe:/a:redhat:rhel_eus:8.2::appstream"
] | null | 8.8 | 7.5 | null |
RHSA-2010:0793
|
Red Hat Security Advisory: glibc security update
|
glibc: ld.so arbitrary DSO loading via LD_AUDIT in setuid/setgid programs
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2023:5440
|
Red Hat Security Advisory: firefox security update
|
firefox: use-after-free in workers Mozilla: Out-of-bounds write in PathOps Mozilla: Use-after-free in Ion Compiler Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 libvpx: Heap buffer overflow in vp8 encoding in libvpx
|
[
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 8.8 | null | null |
RHSA-2023:1092
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: stack overflow in do_proc_dointvec and proc_skip_spaces kernel: use-after-free related to leaf anon_vma double reuse
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | 5.5 | null | null |
RHSA-2015:1634
|
Red Hat Security Advisory: sqlite security update
|
sqlite: stack buffer overflow in src/printf.c
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2017:2687
|
Red Hat Security Advisory: instack-undercloud security update
|
instack-undercloud: uses hardcoded /tmp paths
|
[
"cpe:/a:redhat:openstack-director:8::el7"
] | null | null | 6.1 | null |
RHSA-2024:4620
|
Red Hat Security Advisory: libndp security update
|
libndp: buffer overflow in route information length field
|
[
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 8.1 | null | null |
RHSA-2009:1531
|
Red Hat Security Advisory: seamonkey security update
|
array index error in dtoa implementation of many products firefox: (rejected CVE-2009-1563) Firefox heap buffer overflow in string to number conversion Firefox: Predictable /tmp pathname use Firefox cross-origin data theft through document.getSelection() Firefox download filename spoofing with RTL override Firefox crashes with evidence of memory corruption Firefox integer underflow in FTP directory list parser SeaMonkey scriptable plugin execution in mail (mfsa2010-06)
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
RHSA-2023:2763
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
python: int() type in PyLong_FromString() does not limit amount of digits converting text to int leading to DoS python: open redirection vulnerability in lib/http/server.py may lead to information disclosure python: CPU denial of service via inefficient IDNA decoder
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2021:1125
|
Red Hat Security Advisory: virt:8.3 and virt-devel:8.3 security and bug fix update
|
qemu: out-of-bound heap buffer access via an interrupt ID field
|
[
"cpe:/a:redhat:advanced_virtualization:8.3::el8"
] | null | 2.5 | null | null |
RHSA-2024:8113
|
Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.16.3 security and bug fix update
|
webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule express: Improper Input Handling in Express Redirects send: Code Execution Vulnerability in Send Library serve-static: Improper Sanitization in serve-static body-parser: Denial of Service Vulnerability in body-parser
|
[
"cpe:/a:redhat:openshift_data_foundation:4.16::el9"
] | null | 7.5 | null | null |
RHSA-2014:0230
|
Red Hat Security Advisory: mongodb security update
|
mongodb: memory over-read via incorrect BSON object length
|
[
"cpe:/a:redhat:openstack:4::el6"
] | null | null | null | null |
RHSA-2020:4201
|
Red Hat Security Advisory: OpenShift Virtualization 2.4.2 Images
|
golang: data race in certain net/http servers including ReverseProxy can lead to DoS golang: ReadUvarint and ReadVarint can read an unlimited number of bytes from invalid inputs
|
[
"cpe:/a:redhat:container_native_virtualization:2.4::el8"
] | null | 7.5 | null | null |
RHSA-2023:1454
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
ArgoCD: Authenticated but unauthorized users may enumerate Application names via the API
|
[
"cpe:/a:redhat:openshift_gitops:1.7::el8"
] | null | 5.3 | null | null |
RHSA-2019:3266
|
Red Hat Security Advisory: OpenShift Container Platform 4.1 openshift security update
|
kubernetes: `kubectl cp` allows for arbitrary file write via double symlinks
|
[
"cpe:/a:redhat:openshift:4.1::el7",
"cpe:/a:redhat:openshift:4.1::el8"
] | null | null | 5.3 | null |
RHSA-2015:1229
|
Red Hat Security Advisory: java-1.7.0-openjdk security update
|
OpenJDK: deserialization issue in ObjectInputStream.readSerialData() (Libraries, 8076401) OpenJDK: non-constant time comparisons in crypto code (JCE, 8074865) OpenJDK: incorrect code permission checks in RMIConnectionImpl (JMX, 8075853) OpenJDK: name for reverse DNS lookup used in certificate identity check (JSSE, 8067694) OpenJDK: IIOPInputStream type confusion vulnerability (CORBA, 8076376) ICU: integer overflow in LETableReference verifyLength() (OpenJDK 2D, 8077520) SSL/TLS: "Invariance Weakness" vulnerability in RC4 stream cipher LOGJAM: TLS connections which support export grade DHE key-exchange are vulnerable to MITM attacks OpenJDK: improper permission checks in MBeanServerInvocationHandler (JMX, 8076397) OpenJDK: insufficient context checks during object deserialization (Libraries, 8076405) OpenJDK: RemoteObjectInvocationHandler allows calling finalize() (RMI, 8076409) OpenJDK: incorrect OCSP nextUpdate checking (Libraries, 8075374) OpenJDK: DnsClient fails to release request information after error (JNDI, 8075378) ICU: missing boundary checks in layout engine (OpenJDK 2D, 8071715)
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 3.7 | null |
RHSA-2022:0987
|
Red Hat Security Advisory: Red Hat OpenStack Platform 16.1 (numpy) security update
|
numpy: buffer overflow in the PyArray_NewFromDescr_int() in ctors.c numpy: buffer overflow in the array_from_pyobj() in fortranobject.c
|
[
"cpe:/a:redhat:openstack:16.1::el8"
] | null | 5.5 | null | null |
RHSA-2021:2051
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.7 security update
|
velocity: arbitrary code execution when attacker is able to modify templates netty: Information disclosure via the local system temporary directory netty: possible request smuggling in HTTP/2 due missing validation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3"
] | null | 5.9 | null | null |
RHSA-2022:7337
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: AMD: Branch Type Confusion (non-retbleed) hw: cpu: Intel: Post-barrier Return Stack Buffer Predictions hw: cpu: Intel: information disclosure via local access hw: cpu: AMD: RetBleed Arbitrary Speculative Code Execution with Return Instructions hw: cpu: Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5.6 | null | null |
RHSA-2022:6503
|
Red Hat Security Advisory: openvswitch2.17 security update
|
dpdk: error recovery in mlx5 driver not handled properly, allowing for denial of service
|
[
"cpe:/o:redhat:enterprise_linux:9::fastdatapath"
] | null | 6.5 | null | null |
RHSA-2005:575
|
Red Hat Security Advisory: Adobe Acrobat Reader security update
|
security flaw security flaw
|
[
"cpe:/a:redhat:rhel_extras:3",
"cpe:/a:redhat:rhel_extras:4"
] | null | null | null | null |
RHSA-2024:10964
|
Red Hat Security Advisory: ruby security update
|
rexml: REXML ReDoS vulnerability
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream",
"cpe:/a:redhat:rhel_eus:9.2::crb"
] | null | 7.5 | null | null |
RHSA-2020:4469
|
Red Hat Security Advisory: cups security and bug fix update
|
cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 4.5 | null | null |
RHSA-2010:0490
|
Red Hat Security Advisory: cups security update
|
CUPS administrator web interface CSRF CUPS: texttops unchecked memory allocation failure leading to NULL pointer dereference cups: web interface memory disclosure
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2015:0844
|
Red Hat Security Advisory: openstack-nova security, bug fix, and enhancement update
|
openstack-nova: Nova network denial of service through API filtering openstack-nova: Nova VMware instance in resize state may leak openstack-nova: console Cross-Site WebSocket hijacking
|
[
"cpe:/a:redhat:openstack:5::el6"
] | null | null | null | null |
RHSA-2019:2336
|
Red Hat Security Advisory: unixODBC security update
|
unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 6.8 | null |
RHSA-2022:5263
|
Red Hat Security Advisory: qemu-kvm security and bug fix update
|
QEMU: virtio-net: map leaking on error during receive QEMU: vhost-vsock: missing virtqueue detach on error can lead to memory leak
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 2.5 | null | null |
RHSA-2021:4531
|
Red Hat Security Advisory: OpenJDK 17.0.1 security update for Windows Builds
|
OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
|
[
"cpe:/a:redhat:openjdk:17::windows"
] | null | 3.7 | null | null |
RHSA-2024:4622
|
Red Hat Security Advisory: libndp security update
|
libndp: buffer overflow in route information length field
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 8.1 | null | null |
RHSA-2003:180
|
Red Hat Security Advisory: sharutils security update
|
security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as"
] | null | null | null | null |
RHSA-2015:0249
|
Red Hat Security Advisory: samba3x security update
|
samba: talloc free on uninitialized stack pointer in netlogon server could lead to remote-code execution
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
RHSA-2020:2676
|
Red Hat Security Advisory: grafana security update
|
grafana: SSRF incorrect access control vulnerability allows unauthenticated users to make grafana send HTTP requests to any URL
|
[
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 8.2 | null | null |
RHSA-2012:1467
|
Red Hat Security Advisory: java-1.7.0-ibm security update
|
OpenJDK: missing SecurityManager checks in scripting engine (Scripting, 7046823) JDK: unspecified vulnerability (2D) JDK: unspecified vulnerability (Deployment) JDK: unspecified vulnerability (Deployment) OpenJDK: CRL and certificate extensions handling improvements (Security, 7143872) JDK: unspecified vulnerability (JMX) JDK: unspecified vulnerability (Deployment) OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) JDK: java.lang.reflect.Method invoke() code execution JDK: getDeclaredMethods() and setAccessible() code execution JDK: java.lang.class code execution JDK: java.lang.ClassLoder defineClass() code execution JDK: unspecified vulnerability (Deployment) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: EnvHelp information disclosure (JMX, 7158796) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7169887) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7163198) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) JDK: unspecified vulnerability (2D) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: PropertyElementHandler insufficient access checks (Beans, 7195549) OpenJDK: MethodHandle insufficient access control checks (Libraries, 7196190) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | null | null |
RHSA-2012:0509
|
Red Hat Security Advisory: wireshark security update
|
Wireshark: Null pointer dereference causing application crash when reading malformed pcap file Wireshark: Use-after-free causes heap-based buffer overflow in X.509if dissector wireshark: Infinite loop in the DICOM dissector (64bit): NULL pointer dereference by processing of a corrupted Diameter dictionary file wireshark: Stack-based buffer over-read from tvbuff buffer when reading snoop capture files wireshark: Double-free flaw by uncompressing of a zlib compressed packet wireshark: Heap-based buffer over-read in Visual Networks dissector wireshark: infinite loop DoS in lucent/ascend file parser wireshark: Infinite loop in the ANSI A Interface (IS-634/IOS) dissector wireshark: buffer overflow in the ERF file reader wireshark: multiple file parser vulnerabilities (wnpa-sec-2012-01) wireshark: NULL pointer vulnerabilities (wnpa-sec-2012-02) Wireshark: Dos via large buffer allocation request Wireshark: Dos due to integer overflow in IPTrace capture format parser wireshark: Heap-based buffer overflow when reading ERF packets from pcap/pcap-ng trace files
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
RHSA-2024:0015
|
Red Hat Security Advisory: tigervnc security update
|
xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty
|
[
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 7.6 | null | null |
RHSA-2022:5779
|
Red Hat Security Advisory: ruby:2.5 security update
|
ruby: Regular expression denial of service vulnerability of Date parsing methods ruby: Cookie prefix spoofing in CGI::Cookie.parse
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 7.5 | null | null |
RHSA-2020:2677
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: Special Register Buffer Data Sampling (SRBDS) hw: Vector Register Data Sampling hw: L1D Cache Eviction Sampling
|
[
"cpe:/o:redhat:rhel_eus:8.1::baseos"
] | null | 6.5 | 6.5 | null |
RHSA-2019:0271
|
Red Hat Security Advisory: systemd security update
|
systemd: stack overflow when calling syslog from a command with long cmdline systemd: stack overflow when receiving many journald entries
|
[
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.5 | null |
RHSA-2019:2401
|
Red Hat Security Advisory: procps-ng security update
|
procps: Integer overflows leading to heap overflow in file2strvec
|
[
"cpe:/o:redhat:rhel_aus:7.3::server",
"cpe:/o:redhat:rhel_e4s:7.3::server",
"cpe:/o:redhat:rhel_tus:7.3::server"
] | null | null | 7.3 | null |
RHSA-2023:7599
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.5 bug fix and security update
|
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) opentelemetry: DoS vulnerability in otelhttp
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.5 | null | null |
RHSA-2017:3458
|
Red Hat Security Advisory: eap7-jboss-ec2-eap security update
|
Artemis: Deserialization of untrusted input vulnerability eap: HTTP header injection / response splitting EAP7 Privilege escalation when managing domain including earlier version slaves EAP7: Internal IP address disclosed on redirect when request header Host field is not set undertow: Long URL proxy request lead to java.nio.BufferOverflowException and DoS EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation wildfly: ParseState headerValuesCache can be exploited to fill heap with garbage wildfly: Arbitrary file read via path traversal undertow: HTTP Request smuggling vulnerability due to permitting invalid characters in HTTP requests undertow: IO thread DoS via unclean Websocket closing jackson-databind: Deserialization vulnerability via readValue method of ObjectMapper hibernate-validator: Privilege escalation when running under the security manager undertow: HTTP Request smuggling vulnerability (incomplete fix of CVE-2017-2666) undertow: improper whitespace parsing leading to potential HTTP request smuggling EAP-7: Wrong privileges on multiple property files
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7::el6"
] | null | null | 5.5 | null |
RHSA-2025:2501
|
Red Hat Security Advisory: kernel security update
|
kernel: can: bcm: Fix UAF in bcm_proc_show() kernel: HID: core: zero-initialize the report buffer kernel: ALSA: usb-audio: Fix potential out-of-bound accesses for Extigy and Mbox devices
|
[
"cpe:/o:redhat:rhel_els:7"
] | null | 5.8 | null | null |
RHSA-2024:10214
|
Red Hat Security Advisory: Red Hat Data Grid 8.5.2 security update
|
webpack: DOM Clobbering vulnerability in AutoPublicPathRuntimeModule com.thoughtworks.xstream: XStream is vulnerable to a Denial of Service attack due to stack overflow from a manipulated binary input stream
|
[
"cpe:/a:redhat:jboss_data_grid:8"
] | null | 7.5 | null | null |
RHSA-2023:5709
|
Red Hat Security Advisory: dotnet7.0 security update
|
HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
RHSA-2023:0280
|
Red Hat Security Advisory: sudo security update
|
sudo: arbitrary file write with privileges of the RunAs user
|
[
"cpe:/o:redhat:rhel_e4s:8.1::baseos"
] | null | 7.8 | null | null |
RHSA-2016:0504
|
Red Hat Security Advisory: python-django security update
|
python-django: Malicious redirect and possible XSS attack via user-supplied redirect URLs containing basic auth python-django: User enumeration through timing difference on password hasher work factor upgrade
|
[
"cpe:/a:redhat:openstack:7::el7"
] | null | null | null | null |
RHSA-2021:1086
|
Red Hat Security Advisory: 389-ds:1.4 security and bug fix update
|
389-ds-base: information disclosure during the binding of a DN
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 5.3 | null | null |
RHSA-2022:7541
|
Red Hat Security Advisory: redis:6 security, bug fix, and enhancement update
|
redis: Code injection via Lua script execution environment redis: Malformed Lua script can crash Redis
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.3 | null | null |
RHSA-2022:7581
|
Red Hat Security Advisory: python38:3.8 and python38-devel:3.8 security update
|
python: mailcap: findmatch() function does not sanitize the second argument
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.6 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.